mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-08 19:46:39 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
79b10556b5
commit
70fbbd60aa
@ -58,6 +58,16 @@
|
|||||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis",
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis"
|
"name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/helpers/html.js?ref_type=heads",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/helpers/html.js?ref_type=heads"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/config.js?ref_type=heads#L38",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/config.js?ref_type=heads#L38"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -67,6 +77,19 @@
|
|||||||
"source": {
|
"source": {
|
||||||
"discovery": "EXTERNAL"
|
"discovery": "EXTERNAL"
|
||||||
},
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Canopsis version 23.10.0 includes fixes for the reported vulnerability, and was released on 31 October 2023."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Canopsis version 23.10.0 includes fixes for the reported vulnerability, and was released on 31 October 2023."
|
||||||
|
}
|
||||||
|
],
|
||||||
"credits": [
|
"credits": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -58,6 +58,16 @@
|
|||||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis",
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis"
|
"name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/helpers/html.js?ref_type=heads",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/helpers/html.js?ref_type=heads"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/config.js?ref_type=heads#L38",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/sources/webcore/src/canopsis-next/src/config.js?ref_type=heads#L38"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -67,6 +77,19 @@
|
|||||||
"source": {
|
"source": {
|
||||||
"discovery": "EXTERNAL"
|
"discovery": "EXTERNAL"
|
||||||
},
|
},
|
||||||
|
"solution": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"base64": false,
|
||||||
|
"type": "text/html",
|
||||||
|
"value": "Canopsis version 23.10.0 includes fixes for the reported vulnerability, and was released on 31 October 2023."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"value": "Canopsis version 23.10.0 includes fixes for the reported vulnerability, and was released on 31 October 2023."
|
||||||
|
}
|
||||||
|
],
|
||||||
"credits": [
|
"credits": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -61,6 +61,145 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat JBoss Enterprise Application Platform 8",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"defaultStatus": "unaffected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:1.11.9-2.redhat_00001.1.el8eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:800.3.1-2.GA_redhat_00002.1.el8eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:2.3.14-2.SP2_redhat_00001.1.el8eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:8.0.3-13.GA_redhat_00007.1.el8eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:1.11.9-2.redhat_00001.1.el9eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:800.3.1-2.GA_redhat_00002.1.el9eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:2.3.14-2.SP2_redhat_00001.1.el9eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "not down converted",
|
||||||
|
"x_cve_json_5_version_data": {
|
||||||
|
"versions": [
|
||||||
|
{
|
||||||
|
"version": "0:8.0.3-13.GA_redhat_00007.1.el9eap",
|
||||||
|
"lessThan": "*",
|
||||||
|
"versionType": "rpm",
|
||||||
|
"status": "unaffected"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"defaultStatus": "affected"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat build of Apache Camel for Spring Boot",
|
"product_name": "Red Hat build of Apache Camel for Spring Boot",
|
||||||
"version": {
|
"version": {
|
||||||
@ -165,19 +304,6 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"product_name": "Red Hat JBoss Enterprise Application Platform 8",
|
|
||||||
"version": {
|
|
||||||
"version_data": [
|
|
||||||
{
|
|
||||||
"version_value": "not down converted",
|
|
||||||
"x_cve_json_5_version_data": {
|
|
||||||
"defaultStatus": "affected"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"product_name": "Red Hat JBoss Enterprise Application Platform Expansion Pack",
|
"product_name": "Red Hat JBoss Enterprise Application Platform Expansion Pack",
|
||||||
"version": {
|
"version": {
|
||||||
@ -248,6 +374,16 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://access.redhat.com/errata/RHSA-2024:6883"
|
"name": "https://access.redhat.com/errata/RHSA-2024:6883"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:7441",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2024:7441"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2024:7442",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://access.redhat.com/errata/RHSA-2024:7442"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-7885",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-7885",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
18
2024/9xxx/CVE-2024-9407.json
Normal file
18
2024/9xxx/CVE-2024-9407.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2024-9407",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user